Finding a Connection Chain for Tracing Intruders

Size: px
Start display at page:

Download "Finding a Connection Chain for Tracing Intruders"

Transcription

1 Finding a Connection Chain for Tracing Intruders Kunikazu Yoda and Hiroaki Etoh IBM Tokyo Research Laboratory, Shimotsuruma, Yamato, Kanagawa , Japan {yoda,etoh}@jp.ibm.com Abstract. Intruders usually log in through a chain of multiple computer systems to hide their origins before breaking into their targets, which makes tracing difficult. In this paper we present a method to find the connection chain of an intruder for tracing back to the origin. We focus on telnet and rlogin as interactive applications intruders use to log in through hosts. The method involves setting up packet monitors at as many traffic points as possible on the Internet to record the activities of intruders at the packet level. When a host is compromised and used as a step-through host to access another host, we compare the packet logs of the intruder at that host to logs we have recorded all over the Internet to find the closest match. We define the deviation for one packet stream on a connection from another, and implement a system to compute deviations. If a deviation is small, the two connections must be in the same connection chain. We present some experimental results showing that the deviation for two unrelated packet streams is large enough to be distinguished from the deviation for packet streams on connections in the same chain. 1 Introduction In recent years, unauthorized accesses to computer systems are increasing as more and more commercial activities and services take place on the Internet. One characteristic of network break-ins is that it is very hard to trace the source of an intruder back to the origin after the incident has occurred. In order to hide their identities, intruders usually keep several computers under their control, called step-through hosts, from which they access another computer. Since there are many vulnerable hosts on the Internet and scanning tools are widely available and easy to use to locate these hosts, they are constantly gathering a collection of computers to be used as step-through hosts. Intruders don t log in directly to their targets from their own computers, but rather they first log into a stepthrough host and then another, and continue this step several times making a chain of hosts, before breaking into their targets. They usually erase logs on these step-through hosts. Even if logs remain on a particular host, we can only use it to trace back one link in the chain. Thus, we have to examine each host at a time to follow each of their predecessors in the chain in order to get to the

2 origin. Because the step-through hosts may be in different countries operated by administrators not paying much attention to their systems, it takes a lot of time and effort to get in touch with these administrators to investigate the chain of hosts step by step. Often we would end up at a host where no logs remained to continue the investigation [8]. Intruders know this and take advantage of the features of the Internet to preserve their anonymity. When a user logs into a computer via a network, from there logs into another computer, and then another and so on, TCP connections are established between each pair of computers. We want to find this kind of connection chain. (We will give the formal definition of the connection chain in Sect. 3.) Our approach to tracing considers the following problem: Given a stream of packets on a connection C I an intruder used at some step-through host and a very large number of connections C = {C 1, C 2,...} at various traffic points on the Internet, find C C such that C I and X C are in the same connection chain. We are particularly interested in the case where X C are connections closer to the origin than C I. Although we don t have to trace the links in the chain one by one in our approach, the connection chain found will probably be partial. However, it may contain a host that is or is closer to the origin. In this paper we provide a method to find a connection similar to a given one from very large traffic data. To cope with real-life traffic data, errors and variations of packet data at different connections on the same chain should be taken into consideration. Those problems include propagation delays through the chain, packetization variations because of TCP flow control, clock synchronization errors on time stamps, and others. We focus on telnet [4] and rlogin [2] as the interactive applications whose packets are transmitted through the connection chain. We define the deviation for one stream of packets on a connection from another. It is the difference between the average propagation delay and the minimum propagation delay between the two connections. Experiments show that the deviation for streams of packets on the same chain is much smaller than that for a pair of unrelated streams. The rest of the paper is organized as follows. Section 2 provides a survey of related work. We present our definition of deviation and describe our method in Sect. 3. We show some experimental results in Sect. 4. Finally, Sect. 5 concludes the paper and discusses future work. 2 Related Work We briefly review several systems that have been proposed for tracing intruders in this section. DIDS (Distributed Intrusion Detection System) [5] is a system where all TCP connections and logins within the supervised network are monitored and the system keeps track of all the movement and the current states of users. A host monitor resides on each host in the network, gathering audit information about the host, which is transmitted to the central DIDS director, where the network behavior is accounted for.

3 CIS (Caller Identification System) [1] is a system to authenticate the origin of a user when the user attempts to log into a host at the end of a connection chain. When a user tries to log into the nth host, the nth host queries the n 1th host for a list of its predecessor hosts: n 2, n 3,..., 1. The nth host then queries each of the predecessor host a list of their predecessor hosts. The nth host accepts the user s login only if those lists of predecessor hosts are consistent. Caller ID [10] is a technique the United States Air Force employed to trace intruders. It breaks into the hosts of the chain in the same way as the intruder did to reach the target, going backwards up the chain towards the intruder. It does this while the intruder is active, using the same knowledge and methods as the intruder. However, it is often difficult or impossible to break into a host if the intruder closed the security hole after compromising the host. It is also still illegal to break into someone else s computer, even in response to the intruder s illegal act. Generally, tracing methods can be categorized into two types: host-based and network-based. While host-based methods set up the components for tracing at each host, network-based methods set up components in the network infrastructure. Examples of host-based systems are [1, 5, 9]. The major drawback of these host-based systems is that if the tracing system is not used on a particular host or is modified by an intruder, the whole system can not function reliably once the intruder goes through that host. In the Internet environment, it is difficult to require that all administrative domains employ a particular tracing system on all hosts: every one of which must be kept secured from an intruder s attacks. Therefore, we believe that a host-based system is not feasible on the Internet. Thumbprinting [6] is a network-based method which is based on the fact that the content of the data in a connection is invariant at all points on a connection chain, after taking into account the details of the protocols. A thumbprint, is a small signature which effectively summarizes a certain section of a connection and uniquely distinguishes a given connection from all other unrelated connections but has a similar value for any two connections in the same connection chain. These thumbprints can be routinely stored at many points in the network. When an intrusion is detected at some host, the thumbprint of that connection during the intrusion can be later compared to various thumbprints all over the network during the same period to find the other connections in the chain. The advantage of a network-based approach is that it is useful even if part of the Internet employs it. That is, all the links of a connection chain will not be found sequentially, but parts of the links will be found separately at network locations covered by the system. Although there is still a chance that a tracing system in the network will be compromised by an intruder, it requires fewer components than we need in a host-based system, and these components can be special boxes which are only passively monitoring the traffic and have no other functions. We believe these traffic log boxes can be made very secure.

4 The advantage of thumbprinting is that it requires a very small disk space to store thumbprints. But the special software needs to be installed on all hosts at traffic points for computing thumbprints and the saved thumbprints cannot be used for other purposes such as traffic analysis or intrusion detection. A thumbprint is a summary of contents of a connection for a certain fixed range of time. Because of clock synchronization errors or propagation delays, if a connection continues within one range of time, but another connection in the same chain crosses a boundary of the range, the three thumbprints might be quite different. While our method requires a relatively large disk space to store packet header data, they can be collected by packet capture software already installed on many hosts. The saved data can be used for other purposes and timing errors do not affect the result of our method. 3 Finding Connections in the Chain We will describe the details of our method for tracing connections in this section. First, we formally define some terms. Definition 1 (Connection Chain). When a user on a computer H 0 logs into another computer H 1 via a network, a TCP connection C 1 is established between them. When the user logs from H 1 into another computer H 2, and then H 3,..., H n successively in the same way, TCP connections C 2, C 3,..., C n are established respectively on each link between the computers. We call this sequence of connections C = C 1, C 2,..., C n a connection chain. See Fig. 1 for an illustration of the above definition. H 0 is the source of an intruder and H n is the target. H 1, H 2,..., and H n 1 are step-through hosts the intruder logs in through sequentially. C i is a TCP connection established between H i 1 and H i. Fig. 1. Connection chain

5 Definition 2 (Upstream and Downstream Connection). We say that C i is an upstream connection of C j, and C j is a downstream connection of C i when C i and C j are in the same connection chain C =..., C i,..., C j,... and i < j. At any particular point of time, a TCP connection is uniquely determined by a 4-tuple: source IP address, destination IP address, source port number, and destination port number, thus we can tell which connection a given packet belongs to by looking at the IP and TCP header of the packet. An individual packet will either travel upstream or downstream. If we denote a connection as a 4-tuple (I 1, p 1, I 2, p 2 ), one direction is expressed as (I 1 : p 1 ) (I 2 : p 2 ) and the other is expressed as (I 1 : p 1 ) (I 2 : p 2 ). Definition 3 (Packet Stream). A packet stream on a connection is a series of packets on that connection moving in the same direction and listed in chronological order. There are two packet streams in one connection for each of the directions, but we currently treat each of them independently. Directions are defined with regards to an intruder s actual origin, so we say the direction of a packet stream is upstream if the packets are moving toward the intruder, and downstream if the packets are moving toward the target host. 3.1 Data Collection In this section we describe how to record packet data at traffic points in networks. Packets can be collected at various traffic points in the Internet backbone networks, which usually use optical fiber cables for their links. Optical splitters or some other device that replicates one input signal into multiple output signals can be placed at these links to retrieve a copy of data flowing through the backbone network without much effect on the existing network performance. With one side of the splitter connected to a network card of a computer, the time stamp, IP address, and TCP header of each packet passing through the line can be written to the hard drives of the computer by using packet capture software. 3.2 Problem Statement Based on the definitions Def. 1, Def. 2, and Def. 3, the problem we address is stated as follows. Problem 1 (Discovery of Connection Chain). Given a packet stream on a connection C k in an unknown connection chain C = C 1, C 2,..., C n, find packet streams on upstream connections C i s of C k in the same connection chain from a large number of packet streams of connections. To give a solution to this general problem, we need to be more specific about the conditions of the problem.

6 3.3 Conditions In order to make the technology applicable to encrypted communications in the future and because of concerns regarding privacy issues, we do not use the message content of the TCP packets, but we principally use the time stamps of the packets and the sizes of the TCP packets. At this point we must explain more about the sequence numbers of the packets at different connections in the same chain. The cumulative TCP data bytes transmitted since the start of a connection is measured by the sequence numbers in the TCP headers [3, 7]. The sequence numbers are 32-bit integers assigned to the data bytes in the packets belonging to a particular connection. The initial sequence number for a connection is randomly determined at the establishment of the connection, and the number gets increased as data is transmitted using the connection. The sequence number field in the TCP header of a packet is the sequence number of the first data byte in the packet. Since an upstream connection generally starts earlier and stops later than a downstream connection on the same chain, we can filter out connections which transfer fewer data bytes than a given connection does to help identify possible upstream connections of the given one. 3.4 Basic Idea Figure 2 (left) is a graph of a packet stream on a connection plotted with sequence numbers of the packets on the Y-axis and time stamps when the packets were captured on the X-axis. The data point should move down and to the right when a retransmission occurs, but because we take the upper bound of sequence numbers for each of the time stamps, the graph is monotonically increasing. We don t assume that an intruder runs a script on a host so that commands are automatically executed within a short time, but assume that an intruder manually inputs commands by hands and operates a host interactively for a longer time, so that graphs of the packet streams of those connections must show characteristic patterns for each intrusion. Therefore, it can be expected that graphs of packet streams of different connections will be similar if the proper parts of the graphs from the same chain are compared to each other. Therefore, we will introduce the deviation for a packet stream from another packet stream as a metric of this similarity. If the value is small, one stream is likely to be in the same chain with the other. Otherwise they are probably unrelated. Next we discuss what features remain unchanged and what features get changed between graphs of packet streams on different connections in the same connection chain. First we notice that while we are using telnet or rlogin in a normal way, the same TCP data bytes flow at any connections in the same chain when taking into account flow control and retransmissions of packets. Therefore, the height of the part of a graph which shows the increase in sequence numbers (which is the number of data byte transmitted) should be equal to others in the same connection chain. But since we cannot determine exactly what part of a

7 packet stream A packet stream A packet stream B sequence number sequence number sec sec Fig. 2. Sample graph of a packet stream A (left) and the position of a graph of a packet stream B (right) where the average gap from A on the X-axis is the smallest. graph corresponds to the other because of timing errors, we have to try every starting position of the graph to compare to the other. We use the upper bound of the sequence numbers, and when a packet is lost and a retransmission occurs the data bytes following the lost data is not forwarded to the next connection in the chain until the lost data bytes are retransmitted and acknowledged. Therefore, the propagation delay includes the retransmission time. Hence, if the clocks used by the packet capture software are accurate, a data byte at a downstream connection compared with the same data byte at an upstream connection is observed earlier if the direction of the packet is upstream and later if the direction is downstream, as is expected. However, the propagation delays may have large variances. If a graph is repositioned along the Y-axis so as to match the proper part of the other graph, that part of the graph may be distorted by being extended along the X-axis. Because we assume that an intruder is manipulating a host interactively, we also assume that the average propagation delay a packet travels between the first upstream connection and the last downstream connection is usually several hundred milliseconds and at most a few seconds. It would be too inefficient for an intruder to manipulate a host in a connection chain of a few seconds of delay each way. 3.5 Deviation for Packet Streams We define the deviation for packet streams in this section. Suppose we have a graph of a packet stream A and a graph of another packet stream B. If we move graph B horizontally as well as vertically on the X-Y plane without crossing A so that B is as close as possible to A, the average gap on the X-axis between B and A will be small if the two are in the same connection chain and large if the two are unrelated. Intuitively, we define this average gap as the deviation for B from A. See Fig. 2 (right) for an example. In this figure, the position of the line showing the data for B is where the average gap between the two lines for B and A is the smallest. The formal definition of the deviation is as follows:

8 Definition 4 (Deviation for Packet Streams). Given a packet stream A of n packets, the sequence number of the last data byte in the ith packet of which is a i ; the data size of the ith packet is a i a i 1 bytes, and let t(s) (a 0 < s a n ) be the time at which the packet that contains the data byte associated with a sequence number s is observed, where a 0 is the initial sequence number of A. Similarly, let B be a packet stream of m packets, the sequence number of the last data byte in the ith packet of which is b i, and let u(r) (b 0 < r b m ) be the time at which the packet that contains the data byte associated with a sequence number r is observed, where b 0 is the initial sequence number of B. The deviation for B from A is defined as 1 d min 0 k m { d ( ) T (h, k) min {T (h, k)} 1 h d, d ( h=1 h=1 T (h, k) max {T (h, k)} 1 h d ) } (1) where T (h, k) = u(b k +h) t(a 0 +h), d = a n a 0 and m = max{i b i +d b m }. Note that the sequence numbers associated with the data bytes in the ith packet of A are a i 1 + 1, a i 1 + 2,..., a i and these are within a single packet so that t(a i 1 +1) = t(a i 1 +2) = = t(a i ). The same is true for the sequence numbers and time stamps of B. The deviation for B from A is defined only if the total data size of B is larger than that of A, so we can assume that b m b 0 a n a 0. A deviation is a measurement of how far the graph of a packet stream B differs from the graph of a given packet stream A. It is basically the average horizontal distance between the two graphs computed along the vertical range of graph A. But we have to consider the position of graph B against A so that the average distance between the two is the minimum when computing the deviation. Since we do not know in advance in what range of B be best matched to A, we have to try every range of B. This means we move B vertically to find out the vertical position where the average distance between the two graph is the minimum. The min 0 k m of (1) treats this minimization. We also have to consider the horizontal position. Because if the shapes of the two graphs are almost identical but the horizontal distance between the two graphs is large (due to for example long propagation delays), the deviation would be large, which is obviously not desired. So we move B horizontally as well as vertically to find out the position where the average distance between the two is the minimum. There are two directions for moving B horizontally since B cannot cross A. One is to move from left to right and the other is from right to left. The min 1 h d of (1) treats the minimization of the horizontal position moving from right to left and the max 1 h d of (1) treats the minimization of the horizontal position moving from left to right. 3.6 Analysis of Deviations We analyze what a deviation, defined by Def. 4 means in this section. The following lemma gives an upper bound on the deviation.

9 Lemma 1. Let A and B be packet streams on connections. If the connection of B is in the same connection chain with that of A and the directions of both streams are the same, the deviation for B from A is less than the average propagation delay minus the minimum propagation delay between connections of A and B. Proof. Let α and β be the differences between an accurate clock and the clocks of A and B respectively, and denote t(s) = t(s) + α and ũ(r) = u(r) + β. Since the connections of A and B are in the same connection chain and the packets of both are moving in the same direction, there exists k such that each data byte associated with a sequence number b k + h (h = 1, 2,..., d = a n a 0 ) in B is equal to the data byte associated with a sequence number a 0 + h in A. We denote T (h, k) = ũ(b k + h) t(a 0 + h), and without loss of generality, will focus the proof on the case where T (h, k) 0. This is the case covered by the first equation inside the braces of min in (1): 1 d d h=1 ( ) T (h, k) min {T (h, k)} = 1 1 h d d d h=1 ( ) T (h, k) min { T (h, k)} 1 h d (2) = E( T (h, k)) min 1 h d { T (h, k)} (3) where E( T (h, k)) = 1 d T d h=1 (h, k) is the average of T (h, k). Note that T (h, k) is the propagation time for the data byte associated with a sequence number a 0 + h to travel from the network location at A to the network location at B as measured by accurate clocks. Therefore, the deviation calculated by (1) is less than the value of (3), which is the average propagation delay minus the minimum propagation delay between the connections of A and B. Assuming that the average propagation delay a packet travels from the beginning of a connection chain to the end of the connection chain is at most a few seconds, the deviations for packet streams on those connections are also at most a few seconds. 3.7 Implementation In this section, we show how to compute deviations, defined by Def. 4 in an efficient manner. Suppose we have a given packet stream A as an array of n elements in main memory. A : (t(a 1 ), a 1 ), (t(a 2 ), a 2 ),..., (t(a n ), a n ) Also suppose that we have traffic data S, packets in which are stored in chronological order as they were captured in a storage disk, which is a source of packet streams for comparing with A to compute deviations. It is essential that S should be scanned once sequentially for efficient implementation. The entire structure of the implementation is described in the following steps.

10 1. Until we reach the end of S repeat the following. (a) Take the next packet p to the previous one taken from S. (b) Retrieve the entry of the packet stream to which p belongs from a hash, or create a new entry in the hash when there is no packet stream to which p belongs or p is the first packet of a connection. (c) Do some computation on the entry of the packet stream in the hash to update the values relating to the deviation for that packet stream. 2. Traverse the hash to iterate all the entries of the packet streams to get the deviations for them. The key to the hash is the 4-tuple TCP connection parameters together with the direction of packet p. We will describe the details of the step (1c) in the next section. We denote that the entry of the packet stream B is retrieved at step (1b) and that the packet taken at step (1a) is the kth packet of B. B : (u(b 1 ), b 1 ), (u(b 2 ), b 2 ),..., (u(b k ), b k ),... We also denote that v(r, s) = u(r) t(s). Step (1c): Procedure when the kth packet b k of B is taken from S. For each j = j k, j k + 1,..., k (j 1 = 1) do the following computations. 1. Compute f(k, j) When we move graph A and B along the Y-axis so that a 0 and b j 1 are at the same level 0 on the Y-axis, the two graphs (named as A and B(j)) are repositioned as follows: A : (t(a 1 ), a 1 a 0 ), (t(a 2 ), a 2 a 0 ),..., (t(a n ), a n a 0 ) B(j) : (u(b 1 ), b 1 b j 1 ),..., (u(b j 1 ), 0),..., (u(b k ), b k b j 1 ),.... f(k, j) is the index of A at which a f(k,j) a 0 is the lowest position above b k b j 1, and is computed using f(k 1, j) as the starting position by the following equation. min{i a i a 0 > b k b j 1 } f(k, j) = (= min{i i f(k 1, j), a i a 0 > b k b j 1 }) (4) n + 1 if a n a 0 b k b j 1 f(k, j) = n + 1 is a special case indicating that the height of graph B(j) above 0 exceeds that of A so that no more packet b i (i > k) of B is needed for computing M(i, j) for j. 2. Compute g(k, j), l(k, j), and M(k, j) We then compute M(k, j), the area surrounded by graph A and B(j) in the range [0, b k b j 1 ] on the Y-axis. g(k, j) is the maximum difference and l(k, j) is the minimum difference on the X-axis between A and B(j) in the

11 range [0, b k b j 1 ] on the Y-axis. These values are computed using the values at k 1 by the following equations. M(k, j) = M(k 1, j) L(k, j) if f(k 1, j) < f(k) + v(b k, a f(k,j) ) (b k b k 1 ) if f(k 1, j) = f(k, j) n 0 if f(k 1, j) = f(k, j) = n + 1 (5) L(k, j) = v(b k, a f(k 1,j) ) ( (a f(k 1,j) a 0 ) (b k 1 b j 1 ) ) + f(k,j) 1 i=f(k 1,j)+1 v(b k, a i ) (a i a i 1 ) + v(b k, a f(k,j) ) ( (b k b j 1 ) (a f(k,j) 1 a 0 ) ) g(k, j) = max{g(k 1, j), max{v(b k, a i ) f(k 1, j) i f(k, j)}} l(k, j) = min{l(k 1, j), min{v(b k, a i ) f(k 1, j) i f(k, j)}} If f(k, j) = n + 1, the last term of (6) is not added, and v(b k, a n+1 ) is not counted in (7) either. 3. Compute ˆM(k, j) If f(k, j) = n+1, the range on the Y-axis of B(j) covers the range on the Y- axis of A ([0, d] [b 0 b j 1, b k b j 1 ]). Then M (k, j), the area surrounded by two graphs when we move B(j) as close as possible to A along the X-axis, can be computed by the following equation. M (k, j) = min{ M(k, j) g(k, j) d, M(k, j) l(k, j) d } We can compute ˆM(k, j) = min{m (k, i) i j} by the following equation if either ˆM(k, j 1) or M (k, j) is defined. (6) (7) ˆM(k, j) = min{ ˆM(k, j 1), M (k, j)} (8) After all the computations for j = 1, 2,..., k are done, M(k) = ˆM(k, k) is the area surrounded by graph A and B(k) in the vertical range of A when B(k) moves horizontally and vertically without crossing A so that B(k) is as close as possible to A, where B(k) is a sub array of B: B(k) : (u(b 1 ), b 1 ),..., (u(b k ), b k ) If M(k) is not defined, the deviation for B(k) from A cannot be defined. We can delete objects (such as b j ) associated with j = j k 1, j k + 1,..., j k+1 2 allocated in memory except for the ones at the minimum. (j k is defined by j k+1 = max{j j j k, f(k, j) = n + 1} or j k+1 = 1 if f(k, 1) n.) When we have finished processing all the packets in B and suppose the number of packets in B is m, the deviation for B from A is obtained by M(m)/d.

12 Computation Time. For each b j (the last sequence number of data byte in the jth packet of B), the number of iterations in (4), (6), and (7) is f(k, j) f(k 1, j) + 1 every time the kth packet of B is processed. So the total number of iterations for each b j when all the packets in B are processed is at most m k=1 (f(k, j) f(k 1, j) + 1) = n + m, where m is the number of packets in a packet stream B. This holds for any packet in S. Suppose O(m) = O(n), which is true for larger n in most cases. The computation time in computing deviations for every packet stream in S from A is O(nN), where n is the number of packets in A and N is the number of packets in S. 3.8 A Solution to The Problem Based on the definition Def. 4, a solution to the Problem 1 is briefly described in the following. Solution Take any packet stream A on a connection which an intruder used to access through hosts. 2. Compute deviations for every packet stream available on the Internet around some time period including the time period of A. 3. Find small deviations and examine the connections they involve. 4. Some of those connections could be found to be in the same connection chain if we examine the packets of those connections in detail. 4 Experiments 4.1 Distribution of Deviations Since it might be possible that a small deviation could be computed from a packet stream unrelated to a given one, we examine experimentally with real-life data a distribution of deviations in this section. We have implemented software which computes deviations for packet streams as defined by Def. 4. The program is written in C and runs under Linux (Red Hat 6.1) using libpcap 1 to read packet data recorded by tcpdump 1. The first dataset we used is traffic data recorded at some Internet backbone network locations for an hour by tcpdump. The dataset contains about 2.4 million TCP packets, 5.6 % of which are packets of telnet or rlogin. We took only packets of telnet or rlogin connections which continue for at least one minute and where the size of the total data is at least 60 bytes. We computed deviations from each of the packet stream against all other packet streams (18733 deviations in total). Figure 3 is the distribution of deviations computed on this dataset. We can see from Fig. 3 (right) that a deviation of less than three seconds is extremely rare. This indicates that if the deviation of a packet stream is in this 1 available at ftp://ftp.ee.lbl.gov/

13 % % sec sec Fig. 3. Distribution of deviations computed on a dataset in the range [0,80) with a grid width of two seconds (left) and a closer look over the range [0,12) with a finer grid width of 0.5 seconds (right) range, it is highly likely that the packet stream is in the same connection chain with the given one. We also notice that there are a few, actually two, deviations below one second. Examining the headers of the packets used to derive the deviation, we found that these are really packet streams of adjacent connections in a connection chain; the two deviations are for each direction of packets in the connection. Therefore, we can find a packet stream on a connection in the same connection chain with that of the given one by looking for connections whose average propagation delay minus minimum propagation delay is at most three seconds between the beginning and the end of the chain in this dataset. Generally, this upper bound of the average propagation delay minus the minimum propagation delay of a connection chain gets larger as the time period of a given connection is longer and more data bytes are available. Next we used the data set of NLANR network traffic traces 2. We chose traffic data whose file names begin with AIX, ANL, APN, MRT, NCA, NCL, ODU, OSU, SDC, TAU, or TXS under directory /, and performed the same analysis as we did for the first dataset. The number of deviations computed is in total 40,433. Figure 4 is the result. We can see from Fig. 4 (right) that the frequency gradually decreases to zero as the deviation moves down to around three seconds just like we saw in Fig. 3 (right) for the first dataset, except in the range [1.0, 3.5). Almost all of the deviations in this range involve the same packet stream of a particular connection, so it is considered an error or an exception. 4.2 Performance in Computing Deviations To measure the performance in computing deviations, we carried out an experiment to run our program for various data sizes. The program was run on a PC 2 The dataset is provided by the National Science Foundation NLANR/MOAT Cooperative Agreement (No. ANI ), and the National Laboratory for Applied Network Research, and is available from

14 % 6 % sec sec Fig. 4. Distribution of deviations computed on a data set of NLANR network traffic traces in the range [0,52) with a grid width of two seconds (left) and the closer look over the range [0,12) with a finer grid width of 0.5 seconds (right) which has a 600 MHz Pentium III processor and 192 MB of main memory with an Ultra2 Wide SCSI hard disk attached to it. Table 1 shows the execution time in seconds to compute all the deviations for packet streams in traffic data of N packets from a packet stream of n packets for varying n and N. In the top row of the table, the letter K means thousand or 10 3, and the letter M means million or The result confirms that the computation time is O(nN). Table 1. Execution time (in seconds) to compute deviations n\n 1K 5K 10K 50K 100K 500K 1M Conclusions In this paper, we have presented a network-based tracing method which requires IP and TCP headers of packets and time stamps to be recorded at many places on the Internet. If a packet stream is given in which an intruder accessed a host in a connection chain with telnet or rlogin interactively for a long time, the system we developed computes a deviation for each of the packet streams at various Internet sites from the given stream, and the result would be small only if a packet stream is in the same connection chain as the given one, otherwise it will be large. Our method relies on the fact that the increase in sequence numbers is invariant at all points on a connection chain if the proper sections of packet streams that are in the same chain are compared.

15 We use only time stamps and headers of the packets, not the contents of packets, so that the method would be applicable to encrypted connections such as those used in SSH or SSL telnet in the future. But the fact we mentioned above does not hold when some part of a connection in a chain is encrypted, so our method cannot apply directly in that case. Things get more complicated when compression is used as well as encryption in a connection, where the size of the data after compression and encryption also depends on the contents of the original data. As encrypted communications are becoming more widely used today, a future research question would be regarding a tracing method that is effective even if some of the connections are encrypted and compressed. References 1. H. T. Jung et al. Caller Identification System in the Internet Environment. In Proceedings of the 4th Usenix Security Symposium, B. Kantor. BSD Rlogin. Request For Comments RFC 1282, J. Postel. Transmission Control Protocol. Internet Standards STD 7, J. Postel and J. Reynolds. Telnet Protocol. Internet Standards STD 8, S. Snapp et al. DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype. In Proceedings of the 14th National Computer Security Conference, S. Staniford-Chen and L. T. Heberlein. Holding Intruders Accountable on the Internet. In Proceedings of the 1995 IEEE Symposium on Security and Privacy, W. R. Stevens. TCP/IP Illustrated, Volume 1. Addison Wesley, C. Stoll. The Cukoo s Egg. Doubleday, H. Tsutsui. Distributed Computer Networks for Tracking The Access Path of A User. United States Patent , Date of Patent Jun. 15, S. Wadell. Private Communications

Identifying Stepping Stone Attack using Trace Back Based Detection Approach

Identifying Stepping Stone Attack using Trace Back Based Detection Approach International Journal of Security Technology for Smart Device Vol.3, No.1 (2016), pp.15-20 http://dx.doi.org/10.21742/ijstsd.2016.3.1.03 Identifying Stepping Stone Attack using Trace Back Based Detection

More information

Design of Network-based Connection Traceback System for Current Internet Environment

Design of Network-based Connection Traceback System for Current Internet Environment Design of Network-based Connection Traceback for Current Internet Environment Yang-seo Choi, Hwan-kuk Kim, Byong-cheol Choi, Dong-ho Kang, Seung-wan Han, Dong-il Seo Anti-Cyber Terror Team Electronics

More information

Resist Intruders Manipulation via Context-based TCP/IP Packet Matching

Resist Intruders Manipulation via Context-based TCP/IP Packet Matching 2010 24th IEEE International Conference on Advanced Information Networking and Applications Resist Intruders Manipulation via Context-based TCP/IP Packet Matching Yongzhong Zhang College of Management

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

Configuring IP Services

Configuring IP Services CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc. Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Matching TCP/IP Packets to Resist Stepping-Stone Intruders Evasion

Matching TCP/IP Packets to Resist Stepping-Stone Intruders Evasion Matching TCP/IP Packets to Resist Stepping-Stone Intruders Evasion 1 Ni Long, 2 Jianhua Yang, 1 David Y. Song 1 Department of Electrical and Computer Engineering, North Carolina A & T University E-mail:

More information

Error-Free correlation in Encrypted Attack Traffic by Watermarking flow through Stepping Stones

Error-Free correlation in Encrypted Attack Traffic by Watermarking flow through Stepping Stones e t International Journal on Emerging Technologies 6(2): 235-239(2015) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Error-Free correlation in Encrypted Attack Traffic by Watermarking flow

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets

Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets Pai Peng, Peng Ning, Douglas S. Reeves Department of Computer Science North Carolina State University Xinyuan Wang Department

More information

NAT Router Performance Evaluation

NAT Router Performance Evaluation University of Aizu, Graduation Thesis. Mar, 22 17173 1 NAT Performance Evaluation HAYASHI yu-ichi 17173 Supervised by Atsushi Kara Abstract This thesis describes a quantitative analysis of NAT routers

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

A framework of designing a Packet Filter for Low Cost Network Monitoring

A framework of designing a Packet Filter for Low Cost Network Monitoring 4th International Conference on Electrical and Computer Engineering ICECE 2006, 19-21 December 2006, Dhaka, Bangladesh A framework of designing a Packet Filter for Low Cost Network Monitoring Dr. Shishir

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Denial of Service, Traceback and Anonymity

Denial of Service, Traceback and Anonymity Purdue University Center for Education and Research in Information Assurance and Security Denial of Service, Traceback and Anonymity Clay Shields Assistant Professor of Computer Sciences CERIAS Network

More information

Correlating Temporal Thumbprints for Tracing Intruders

Correlating Temporal Thumbprints for Tracing Intruders Correlating Temporal Thumbprints for Tracing Intruders Jianhua Yang 1, Shou-Hsuan Stephen Huang 1 The Department of Mathematics and Computer Science, Bennett College 900 E. Washington Street, Greensboro,

More information

Solving Time Gap Problems Through The Optimization of Detecting Stepping Stone Algorithm

Solving Time Gap Problems Through The Optimization of Detecting Stepping Stone Algorithm Solving Time Gap Problems Through The Optimization of Detecting Stepping Stone Algorithm Mohd Nizam Omar 1, Mohd Aizaini Maarof 2 and Anazida Zainal 3 1, 2, 3 Group on Artificial Immune Network and Security

More information

Midterm II December 4 th, 2006 CS162: Operating Systems and Systems Programming

Midterm II December 4 th, 2006 CS162: Operating Systems and Systems Programming Fall 2006 University of California, Berkeley College of Engineering Computer Science Division EECS John Kubiatowicz Midterm II December 4 th, 2006 CS162: Operating Systems and Systems Programming Your

More information

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli)

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) TCP CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) 1 Sources Fall and Stevens, TCP/IP Illustrated Vol. 1, 2nd edition Congestion Avoidance

More information

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing

A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing Sanya Tangpongprasit, Takahiro Katagiri, Hiroki Honda, Toshitsugu Yuba Graduate School of Information

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Compiler Design Prof. Y. N. Srikant Department of Computer Science and Automation Indian Institute of Science, Bangalore

Compiler Design Prof. Y. N. Srikant Department of Computer Science and Automation Indian Institute of Science, Bangalore Compiler Design Prof. Y. N. Srikant Department of Computer Science and Automation Indian Institute of Science, Bangalore Module No. # 10 Lecture No. # 16 Machine-Independent Optimizations Welcome to the

More information

THE TRANSPORT LAYER UNIT IV

THE TRANSPORT LAYER UNIT IV THE TRANSPORT LAYER UNIT IV The Transport Layer: The Transport Service, Elements of Transport Protocols, Congestion Control,The internet transport protocols: UDP, TCP, Performance problems in computer

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

Introduction to Security

Introduction to Security IS 2150 / TEL 2810 Introduction to Security James Joshi Professor, SIS Lecture 12 2016 Intrusion Detection, Auditing System Firewalls & VPN 1 Intrusion Detection 2 Intrusion Detection/Response Denning:

More information

More Summer Program t-shirts

More Summer Program t-shirts ICPSR Blalock Lectures, 2003 Bootstrap Resampling Robert Stine Lecture 2 Exploring the Bootstrap Questions from Lecture 1 Review of ideas, notes from Lecture 1 - sample-to-sample variation - resampling

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

Network Model: Each layer has a specific function.

Network Model: Each layer has a specific function. OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.

More information

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

Developing the Sensor Capability in Cyber Security

Developing the Sensor Capability in Cyber Security Developing the Sensor Capability in Cyber Security Tero Kokkonen, Ph.D. +358504385317 tero.kokkonen@jamk.fi JYVSECTEC JYVSECTEC - Jyväskylä Security Technology - is the cyber security research, development

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0 Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0 April 9, 2012 Introduction One of the earliest indicators of an impending network attack is the presence of network reconnaissance.

More information

2.3 Algorithms Using Map-Reduce

2.3 Algorithms Using Map-Reduce 28 CHAPTER 2. MAP-REDUCE AND THE NEW SOFTWARE STACK one becomes available. The Master must also inform each Reduce task that the location of its input from that Map task has changed. Dealing with a failure

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

How Secured2 Uses Beyond Encryption Security to Protect Your Data

How Secured2 Uses Beyond Encryption Security to Protect Your Data Secured2 Beyond Encryption How Secured2 Uses Beyond Encryption Security to Protect Your Data Secured2 Beyond Encryption Whitepaper Document Date: 06.21.2017 Document Classification: Website Location: Document

More information

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers

More information

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics:

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics: Network Forensics: Network OS Fingerprinting Prefix Hijacking Analysis Scott Hand September 30 th, 2011 Outline 1 Network Forensics Introduction OS Fingerprinting 2 Prefix Hijacking Theory BGP Background

More information

The Client Server Model and Software Design

The Client Server Model and Software Design The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction

More information

III Data Structures. Dynamic sets

III Data Structures. Dynamic sets III Data Structures Elementary Data Structures Hash Tables Binary Search Trees Red-Black Trees Dynamic sets Sets are fundamental to computer science Algorithms may require several different types of operations

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

An overview on Internet Measurement Methodologies, Techniques and Tools

An overview on Internet Measurement Methodologies, Techniques and Tools An overview on Internet Measurement Methodologies, Techniques and Tools AA 2011/2012 emiliano.casalicchio@uniroma2.it (Agenda) Lezione 2/05/2012 Part 1 Intro basic concepts ISP Traffic exchange (peering)

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking 1 Review of TCP/IP working Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path Frame Path Chapter 3 Client Host Trunk Link Server Host Panko, Corporate

More information

Worst-case running time for RANDOMIZED-SELECT

Worst-case running time for RANDOMIZED-SELECT Worst-case running time for RANDOMIZED-SELECT is ), even to nd the minimum The algorithm has a linear expected running time, though, and because it is randomized, no particular input elicits the worst-case

More information

TCP: Flow and Error Control

TCP: Flow and Error Control 1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol

More information

An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets

An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets Ying-Wei Kuo and Shou-Hsuan Stephen Huang Department of Computer Science University of Houston Houston, TX, 77204, USA Email: {ykuo,

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Network Working Group Request for Comments: 2059 Category: Informational January 1997

Network Working Group Request for Comments: 2059 Category: Informational January 1997 Network Working Group C. Rigney Request for Comments: 2059 Livingston Category: Informational January 1997 Status of this Memo RADIUS Accounting This memo provides information for the Internet community.

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Edge Classification in Networks

Edge Classification in Networks Charu C. Aggarwal, Peixiang Zhao, and Gewen He Florida State University IBM T J Watson Research Center Edge Classification in Networks ICDE Conference, 2016 Introduction We consider in this paper the edge

More information

Design and Implementation of A P2P Cooperative Proxy Cache System

Design and Implementation of A P2P Cooperative Proxy Cache System Design and Implementation of A PP Cooperative Proxy Cache System James Z. Wang Vipul Bhulawala Department of Computer Science Clemson University, Box 40974 Clemson, SC 94-0974, USA +1-84--778 {jzwang,

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

An Efficient Clustering Method for k-anonymization

An Efficient Clustering Method for k-anonymization An Efficient Clustering Method for -Anonymization Jun-Lin Lin Department of Information Management Yuan Ze University Chung-Li, Taiwan jun@saturn.yzu.edu.tw Meng-Cheng Wei Department of Information Management

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating

More information

Network Connectivity and Mobility

Network Connectivity and Mobility Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

A Distributed Intrusion Alert System

A Distributed Intrusion Alert System A Distributed Intrusion Alert System Chih-Yao Lin, Hsiang-Ren Shih, and Yomin Hou Taiwan National Computer Emergency Response Team {chinyao, shr, yominhou}@twncert.org.tw Abstract In this paper, a distributed

More information

Matching TCP/IP Packets to Detect Stepping-Stone Intrusion

Matching TCP/IP Packets to Detect Stepping-Stone Intrusion IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.10, October 2006 269 Matching TCP/IP Packets to Detect Stepping-Stone Intrusion Jianhua Yang, and Shou-Hsuan Stephen Huang

More information

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long 6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,

More information

Encrypted Traffic Security (ETS) White Paper

Encrypted Traffic Security (ETS) White Paper Encrypted Traffic Security (ETS) White Paper The rapid rise in encrypted traffic is changing the security landscape. As more organizations become digital, an increasing number of services and applications

More information

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas Introduction to Cryptography Lecture 3 Benny Pinkas page 1 1 Pseudo-random generator Pseudo-random generator seed output s G G(s) (random, s =n) Deterministic function of s, publicly known G(s) = 2n Distinguisher

More information

Efficiency Optimisation Of Tor Using Diffie-Hellman Chain

Efficiency Optimisation Of Tor Using Diffie-Hellman Chain Efficiency Optimisation Of Tor Using Diffie-Hellman Chain Kun Peng Institute for Infocomm Research, Singapore dr.kun.peng@gmail.com Abstract Onion routing is the most common anonymous communication channel.

More information

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Internet Security Mechanisms Prevent: Firewall, IPsec, SSL Detect: Intrusion Detection Survive/ Response:

More information

Your favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Your favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY VISIT: Course Code : MCS-042 Course Title : Data Communication and Computer Network Assignment Number : MCA (4)/042/Assign/2014-15 Maximum Marks : 100 Weightage : 25% Last Dates for Submission : 15 th

More information

Advanced Database Systems

Advanced Database Systems Lecture IV Query Processing Kyumars Sheykh Esmaili Basic Steps in Query Processing 2 Query Optimization Many equivalent execution plans Choosing the best one Based on Heuristics, Cost Will be discussed

More information

Video Streaming Over Multi-hop Wireless Networks

Video Streaming Over Multi-hop Wireless Networks Video Streaming Over Multi-hop Wireless Networks Hao Wang Dept. of Computer Information System, Cameron University hwang@cameron.edu Andras Farago, Subbarayan Venkatesan Dept. of Computer Science, The

More information

Log File Modification Detection and Location Using Fragile Watermark

Log File Modification Detection and Location Using Fragile Watermark Log File Modification Detection and Location Using Fragile Watermark Liang Xu and Huiping Guo Department of Computer Science California State University at Los Angeles Los Angeles, CA, USA Abstract- In

More information

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. # 20 Concurrency Control Part -1 Foundations for concurrency

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

Stager. A Web Based Application for Presenting Network Statistics. Arne Øslebø

Stager. A Web Based Application for Presenting Network Statistics. Arne Øslebø Stager A Web Based Application for Presenting Network Statistics Arne Øslebø Keywords: Network monitoring, web application, NetFlow, network statistics Abstract Stager is a web based

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Analyzing Dshield Logs Using Fully Automatic Cross-Associations

Analyzing Dshield Logs Using Fully Automatic Cross-Associations Analyzing Dshield Logs Using Fully Automatic Cross-Associations Anh Le 1 1 Donald Bren School of Information and Computer Sciences University of California, Irvine Irvine, CA, 92697, USA anh.le@uci.edu

More information

Host Identity Sources

Host Identity Sources The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating

More information

Intrusion Detection Using Data Mining Technique (Classification)

Intrusion Detection Using Data Mining Technique (Classification) Intrusion Detection Using Data Mining Technique (Classification) Dr.D.Aruna Kumari Phd 1 N.Tejeswani 2 G.Sravani 3 R.Phani Krishna 4 1 Associative professor, K L University,Guntur(dt), 2 B.Tech(1V/1V),ECM,

More information

Shingling Minhashing Locality-Sensitive Hashing. Jeffrey D. Ullman Stanford University

Shingling Minhashing Locality-Sensitive Hashing. Jeffrey D. Ullman Stanford University Shingling Minhashing Locality-Sensitive Hashing Jeffrey D. Ullman Stanford University 2 Wednesday, January 13 Computer Forum Career Fair 11am - 4pm Lawn between the Gates and Packard Buildings Policy for

More information

Lecture 17: Recursive Ray Tracing. Where is the way where light dwelleth? Job 38:19

Lecture 17: Recursive Ray Tracing. Where is the way where light dwelleth? Job 38:19 Lecture 17: Recursive Ray Tracing Where is the way where light dwelleth? Job 38:19 1. Raster Graphics Typical graphics terminals today are raster displays. A raster display renders a picture scan line

More information

Principles of Algorithm Design

Principles of Algorithm Design Principles of Algorithm Design When you are trying to design an algorithm or a data structure, it s often hard to see how to accomplish the task. The following techniques can often be useful: 1. Experiment

More information

ELEC5616 COMPUTER & NETWORK SECURITY

ELEC5616 COMPUTER & NETWORK SECURITY ELEC5616 COMPUTER & NETWORK SECURITY Lecture 17: Network Protocols I IP The Internet Protocol (IP) is a stateless protocol that is used to send packets from one machine to another using 32- bit addresses

More information

INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli

INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli maselli@di.uniroma1.it Prestazioni dei sistemi di rete 2 Overview Basic concepts Characterization of traffic properties that are important to measure

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

Kinematics of Machines Prof. A. K. Mallik Department of Mechanical Engineering Indian Institute of Technology, Kanpur. Module 10 Lecture 1

Kinematics of Machines Prof. A. K. Mallik Department of Mechanical Engineering Indian Institute of Technology, Kanpur. Module 10 Lecture 1 Kinematics of Machines Prof. A. K. Mallik Department of Mechanical Engineering Indian Institute of Technology, Kanpur Module 10 Lecture 1 So far, in this course we have discussed planar linkages, which

More information

Lecture 2: Streaming Algorithms for Counting Distinct Elements

Lecture 2: Streaming Algorithms for Counting Distinct Elements Lecture 2: Streaming Algorithms for Counting Distinct Elements 20th August, 2008 Streaming Algorithms Streaming Algorithms Streaming algorithms have the following properties: 1 items in the stream are

More information

Midterm Exam #2 December 4, 2013 CS162 Operating Systems

Midterm Exam #2 December 4, 2013 CS162 Operating Systems University of California, Berkeley College of Engineering Computer Science Division EECS Fall 2013 Anthony D. Joseph and John Canny Midterm Exam #2 December 4, 2013 CS162 Operating Systems Your Name: SID

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

TCP/IP-2. Transmission control protocol:

TCP/IP-2. Transmission control protocol: TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP

More information

Redesde Computadores(RCOMP)

Redesde Computadores(RCOMP) Redesde Computadores(RCOMP) Lecture 06 2016/2017 IPv4 routeing. Static routeing and dynamic routeing. Routeing protocols: RIP, RIPv2, EIGRP and OSPF. Autonomous systems and route redistribution Instituto

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information